CN113965312A - Space encryption method based on three-dimensional CAP constellation - Google Patents

Space encryption method based on three-dimensional CAP constellation Download PDF

Info

Publication number
CN113965312A
CN113965312A CN202111231755.9A CN202111231755A CN113965312A CN 113965312 A CN113965312 A CN 113965312A CN 202111231755 A CN202111231755 A CN 202111231755A CN 113965312 A CN113965312 A CN 113965312A
Authority
CN
China
Prior art keywords
constellation
transformation
masking factor
level
dimensional
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111231755.9A
Other languages
Chinese (zh)
Other versions
CN113965312B (en
Inventor
田凤
顾宇
张琦
忻向军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou Beiyou New Generation Information Technology Research Institute Co ltd
Original Assignee
Changzhou Beiyou New Generation Information Technology Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou Beiyou New Generation Information Technology Research Institute Co ltd filed Critical Changzhou Beiyou New Generation Information Technology Research Institute Co ltd
Priority to CN202111231755.9A priority Critical patent/CN113965312B/en
Publication of CN113965312A publication Critical patent/CN113965312A/en
Application granted granted Critical
Publication of CN113965312B publication Critical patent/CN113965312B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention belongs to the technical field of communication, and particularly relates to a space encryption method based on a three-dimensional CAP constellation. The space encryption method comprises the following steps: the method comprises the following steps of taking a Logistic Map model as a first chaotic model and generating a first-stage masking factor for carrying out XOR operation on pseudorandom input data; the super four-wing chaotic model is used as a second chaotic model for generating a second-level masking factor and a third-level masking factor which are used for respectively carrying out displacement transformation and space transformation on the three-dimensional CAP constellation; a three level masking factor is used for the cryptographic modulation of the three dimensional CAP constellation. According to the invention, two chaotic models are combined, firstly, the XOR operation is carried out on pseudo-random input data, then the displacement transformation and the space transformation of a three-dimensional constellation are realized, and the effect of communication safety can be effectively improved; the space encryption method based on the three-dimensional CAP constellation increases the encryption flexibility, and simultaneously has higher encryption performance and better error rate performance because the Euclidean distance is larger than that of a two-dimensional constellation.

Description

Space encryption method based on three-dimensional CAP constellation
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a space encryption method based on a three-dimensional CAP constellation.
Background
Due to the emergence of various communication technologies, the development of applications, virtual reality, 4k video and the like of the fifth generation mobile communication technology (5G) is continuous, and the search for a modulation technology with low cost and high reliability has become a key research method for communication development. The carrierless amplitude/phase (CAP) modulation has the advantages of better spectrum utilization rate, low complexity and the like, and the multidimensional CAP modulation technology not only improves the data transmission rate, but also provides a larger space for further development of CAP system throughput, user multiple access and other performances.
In addition, with the rapid development of the internet and digital technology, communication security is also receiving high attention. In chaos, the chaotic system has the characteristics of sensitivity to initial values, strong pseudo-randomness, ergodicity and the like, and is very suitable for information encryption in the communication field. However, the conventional encryption algorithm, such as the encryption algorithm based on only Logistic mapping, has a simple structure, is low in computation complexity, is easily attacked by brute force and statistical analysis, and is low in system security based on only Logistic map encryption.
Disclosure of Invention
The invention aims to provide a spatial encryption method based on a three-dimensional CAP constellation.
In order to solve the above technical problem, the present invention provides a spatial encryption method based on a three-dimensional CAP constellation, including: the method comprises the following steps of taking a Logistic map model as a first chaotic model and generating a first-stage masking factor for carrying out XOR operation on pseudorandom input data; the super four-wing chaotic model is used as a second chaotic model for generating a second-level masking factor and a third-level masking factor which are used for respectively carrying out displacement transformation and space transformation on the three-dimensional CAP constellation; a three level masking factor is used for the cryptographic modulation of the three dimensional CAP constellation.
The method has the advantages that the Logistic map model and the hyper-four-wing chaotic model are combined, firstly, the XOR operation is carried out on the pseudo-random input data, then, the displacement transformation and the space transformation of the three-dimensional constellation are realized, and the effect of communication safety can be effectively improved; the space encryption method based on the three-dimensional CAP constellation increases the encryption flexibility, and simultaneously has higher encryption performance and better error rate performance because the Euclidean distance is larger than that of a two-dimensional constellation.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flow chart of a spatial encryption method based on a three-dimensional constellation according to the present invention;
FIG. 2 is a bifurcation diagram of the Logistic map chaos model according to the present invention;
FIG. 3 is a phase diagram of an ultra four-wing chaotic model according to the present invention;
FIG. 4 is a constellation diagram of 8 constellation points of a three-dimensional CAP constellation according to the present invention after two-stage masking;
FIG. 5 is a three-level masked constellation diagram of 8 constellation points of the three-dimensional CAP constellation according to the present invention;
FIG. 6 is a constellation diagram after being correctly decrypted by the third and second level masking factors according to the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, in one embodiment, the present invention provides a spatial encryption method based on a three-dimensional CAP constellation, including: the method comprises the following steps of taking a Logistic map model as a first chaotic model and generating a first-stage masking factor for carrying out XOR operation on pseudorandom input data; the super four-wing chaotic model is used as a second chaotic model for generating a second-level masking factor and a third-level masking factor which are used for respectively carrying out displacement transformation and space transformation on the three-dimensional CAP constellation; a three level masking factor is used for the cryptographic modulation of the three dimensional CAP constellation.
In the embodiment, the Logistic map model and the hyper-four-wing chaotic model are combined, firstly, the XOR operation is carried out on the pseudo-random input data, then, the displacement transformation and the space transformation of the three-dimensional constellation are realized, and the effect of communication safety can be effectively improved; the space encryption method based on the three-dimensional CAP constellation increases the encryption flexibility, and simultaneously has higher encryption performance and better error rate performance because the Euclidean distance is larger than that of a two-dimensional constellation.
In this embodiment, preferably, the expression of the logistic map model is as follows:
un+1=kun(1-un)……①
wherein k is a bifurcation parameter, and the value range of k is more than 0 and less than or equal to 4; initial value u0The value range of (1) is (0); u. ofnExpressing a value obtained after a formula (I) is iterated for n times; and generating a first-level masking factor l by using a formula I, wherein the specific rule is as follows:
l=floor(mod(u*1e16,2))……②;
wherein mod represents the complementation, floor represents the rounding of decimal, and u is the chaotic sequence generated by the formula (i).
In this embodiment, the value of k in formula (i) is preferably 3.95.
Fig. 2 is a bifurcation diagram of the logistic map chaotic model according to the present invention.
In this embodiment, preferably, the expression of the hyper-four-wing chaotic model is as follows:
Figure BDA0003316250960000041
wherein, the parameters x, y and z are system state variables; a. b, c, d, e, k, m and n are system parameters and are constant numbers; w is a system state feedback variable; t is the step length, and the value is an integer larger than zero;
the process of generating the second level masking factor includes: generating x, y, z and w four chaotic sequences through an ultra-four wing chaotic model, generating a second-level masking factor by using x, y and z, and using the second-level masking factor as displacement amplitude transformation of a three-dimensional CAP (CAP phase CAP) constellation point coordinate, wherein the x-axis constellation point coordinate is transformed to mask a factor S1; the y-axis constellation point coordinate transformation masking factor S2; z-axis constellation point coordinate transformation masking factor S3; the specific transformation rule is as follows:
Figure BDA0003316250960000042
wherein x, y and z are variables in the formula III, mod represents the remainder operation, and floor represents rounding down the decimal.
In this embodiment, preferably, the process of generating the third level masking factor includes: generating a w chaotic sequence through an ultra-four wing chaotic model, generating a third-level masking factor by using w, and using the third-level masking factor S4 as the space transformation of the three-dimensional CAP constellation point coordinates, wherein the specific rule is as follows:
S4=floor(mod(w,8))+1……⑤
w is a variable in the formula (c), mod represents a remainder operation, and floor represents rounding down on a decimal.
In the present embodiment, a, b, c, d, e, k, m,The values of n are respectively as follows: a is 8; b is-1; c is-40; d is 1; e is 2; k is-14; m is 1; n is-2; the initial values of the variables x, y, z, w are: x is the number of0=0.1;y0=0.1;z0=0.1;w0=0.1。
Fig. 3 is a phase diagram of the hyper-four-wing chaotic model according to the present invention.
In one application scenario, the process of encrypted modulation of the three-dimensional CAP constellation includes: generating a pseudo-random bit sequence p, and carrying out XOR operation on the generated pseudo-random bit sequence p and a first-stage masking factor L to obtain a bit sequence L:
L=xor(p,l)……⑥;
namely, the one-stage covering based on the XOR operation of the pseudorandom bit sequence is realized;
performing serial-parallel conversion, namely performing serial-parallel conversion on the bit sequence subjected to the exclusive-or operation, and converting the bit sequence into three paths of parallel bit sequences to obtain a bit data set with 3 columns;
constellation mapping, namely, taking each row in a three-row parallel bit data group as a group, mapping each row of bit data into symbol information of constellation points according to a Gray mapping rule, and obtaining a three-dimensional CAP constellation map after mapping;
performing displacement transformation, namely performing displacement transformation on the constellation points in the three-dimensional CAP constellation diagram respectively, wherein x-axis constellation point coordinate transformation S1, y-axis constellation point coordinate transformation S2 and z-axis constellation point coordinate transformation S3 are performed; wherein
Assume a certain constellation point D in the three-dimensional CAP constellation diagrami=(Di1,Di2,Di3) Constellation point Di=(Di1,Di2,Di3) Sequentially obtaining constellation point coordinates D after displacement transformationi'=(Di'1,Di'2,Di'3) Wherein:
Figure BDA0003316250960000061
namely, the two-stage covering based on the constellation displacement transformation is realized;
FIG. 4 is a constellation diagram of 8 constellation points of a three-dimensional CAP constellation according to the present invention after two-stage masking;
space transformation, namely respectively carrying out space transformation on constellation points in the three-dimensional CAP constellation diagram, and carrying out a third-level masking factor S4iThe real number in the middle of 1-8 represents eight regions of a three-dimensional space respectively, and each region is represented by a coordinate point: 1,1]、II=[-1,1,1]、III=[-1,-1,1]、IV=[1,-1,1]、V=[1,1,-1]、VI=[-1,1,-1]、VII=[-1,-1,-1]、VIII=[1,-1,-1];S4ix、S4iy、S4izRespectively is a coordinate point of the x axis, the y axis and the z axis of the space corresponding to the masking factor; performing spatial transformation according to a third level masking factor S4, and performing displacement transformation to obtain constellation points D'iAfter spatial transformation, the coordinates of the constellation points become D "i=(D”i1,D”i2,D”i3) Wherein:
Figure BDA0003316250960000062
FIG. 5 is a three-level masked constellation diagram of 8 constellation points of the three-dimensional CAP constellation according to the present invention;
after the constellation points are encrypted by the three-level masking factor, performing M times of upsampling on the output symbol information to obtain the upsampled symbol information;
performing shaping filtering on the up-sampled symbol information by using three filters which are orthogonal to each other pairwise;
and adding the three paths of parallel symbol information to obtain a complete encrypted modulation signal.
In this embodiment, preferably, the spatial encryption method further includes: after receiving an encrypted modulation signal passing through a channel, sequentially carrying out matched filtering, down sampling, three-level constellation decryption based on space transformation and two-level constellation decryption based on displacement transformation, obtaining original symbol information according to a minimum Euclidean distance judgment method, carrying out first-level bit decryption based on XOR operation, and recovering an original bit sequence.
FIG. 6 is a constellation diagram after being correctly decrypted by the third and second level masking factors according to the present invention.
In conclusion, the Logistic map model and the hyper-four-wing chaotic model are combined, firstly, the XOR operation is carried out on the pseudo-random input data, then the displacement transformation and the space transformation of the three-dimensional constellation are realized, and the effect of communication safety can be effectively improved; the space encryption method based on the three-dimensional CAP constellation increases the encryption flexibility, and simultaneously has higher encryption performance and better error rate performance because the Euclidean distance is larger than that of a two-dimensional constellation.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In light of the foregoing description of the preferred embodiment of the present invention, many modifications and variations will be apparent to those skilled in the art without departing from the spirit and scope of the invention. The technical scope of the present invention is not limited to the content of the specification, and must be determined according to the scope of the claims.

Claims (8)

1. A spatial encryption method based on a three-dimensional CAP constellation, comprising:
the method comprises the following steps of taking a Logistic Map model as a first chaotic model and generating a first-stage masking factor for carrying out XOR operation on pseudorandom input data;
the super four-wing chaotic model is used as a second chaotic model for generating a second-level masking factor and a third-level masking factor which are used for respectively carrying out displacement transformation and space transformation on the three-dimensional CAP constellation;
a three level masking factor is used for the cryptographic modulation of the three dimensional CAP constellation.
2. The spatial encryption method of claim 1,
the expression of the Logistic Map model is as follows:
un+1=kun(1-un)……①
wherein k is a bifurcation parameter, and the value range of k is more than 0 and less than or equal to 4; initial value u0The value range of (1) is (0); u. ofnExpressing a value obtained after a formula (I) is iterated for n times; and
generating a first-level masking factor l by using a formula I, wherein the specific rule is as follows:
l=floor(mod(u*1e16,2))……②
wherein mod represents the complementation, floor represents the rounding of decimal, and u is the chaotic sequence generated by the formula (i).
3. The spatial encryption method of claim 2, wherein k in formula (i) has a value of 3.95.
4. The spatial encryption method of claim 3,
the expression of the ultra-four-wing chaotic model is as follows:
Figure FDA0003316250950000011
wherein, the parameters x, y and z are system state variables; a. b, c, d, e, k, m and n are system parameters and are constant numbers; w is a system state feedback variable; t is the step length, and the value is an integer larger than zero; and
the process of generating the second level masking factor includes:
generating x, y, z and w four chaotic sequences through an ultra-four wing chaotic model, generating a second-level masking factor by using x, y and z, and using the second-level masking factor as displacement amplitude transformation of a three-dimensional CAP (CAP phase CAP) constellation point coordinate, wherein the x-axis constellation point coordinate is transformed to mask a factor S1; the y-axis constellation point coordinate transformation masking factor S2; z-axis constellation point coordinate transformation masking factor S3; the specific transformation rule is as follows:
Figure FDA0003316250950000021
wherein x, y and z are variables in the formula III, mod represents the remainder operation, and floor represents rounding down the decimal.
5. The spatial encryption method of claim 4,
the process of generating the tertiary masking factor includes:
generating a w chaotic sequence through an ultra-four wing chaotic model, generating a third-level masking factor by using w, and using the third-level masking factor S4 as the space transformation of the three-dimensional CAP constellation point coordinates, wherein the specific rule is as follows:
S4=floor(mod(w,8))+1……⑤
w is a variable in the formula (c), mod represents a remainder operation, and floor represents rounding down on a decimal.
6. The spatial encryption method of claim 5,
a. the values of b, c, d, e, k, m and n are respectively as follows: a is 8; b is-1; c is-40; d is 1; e is 2; k is-14; m is 1; n is-2;
the initial values of the variables x, y, z, w are: x is the number of0=0.1;y0=0.1;z0=0.1;w0=0.1。
7. The spatial encryption method of claim 6,
the process of cryptographic modulation of the three-dimensional CAP constellation includes:
generating a pseudo-random bit sequence p, and carrying out XOR operation on the generated pseudo-random bit sequence p and a first-stage masking factor L to obtain a bit sequence L:
L=xor(p,l)……⑥;
realizing the first-level covering based on the XOR operation of the pseudorandom bit sequence;
performing serial-parallel conversion, namely performing serial-parallel conversion on the bit sequence subjected to the exclusive-or operation, and converting the bit sequence into three paths of parallel bit sequences to obtain a bit data set with 3 columns;
constellation mapping, namely, taking each row in a three-row parallel bit data group as a group, mapping each row of bit data into symbol information of constellation points according to a Gray mapping rule, and obtaining a three-dimensional CAP constellation map after mapping;
performing displacement transformation, namely performing displacement transformation on the constellation points in the three-dimensional CAP constellation diagram respectively, wherein the coordinate of the constellation point on the x axis is transformed S1; y-axis constellation point coordinate transformation S2; z-axis constellation point coordinate transformation S3; implementing a secondary masking based on constellation shift transformation; wherein
Assume a certain constellation point D in the three-dimensional CAP constellation diagrami=(Di1,Di2,Di3) Constellation point Di=(Di1,Di2,Di3) Sequentially obtaining constellation point coordinates D 'after displacement transformation'i=(D′i1,D′i2,D′i3) Wherein:
Figure FDA0003316250950000031
space transformation, namely respectively carrying out space transformation on constellation points in the three-dimensional CAP constellation diagram, and carrying out a third-level masking factor S4i1-8 middle real numbers, S4ix、S4iy、S4izRespectively is a coordinate point of the x axis, the y axis and the z axis of the space corresponding to the masking factor; performing spatial transformation according to a third level masking factor S4, and performing displacement transformation to obtain constellation points D'iAfter spatial transformation, the constellation point coordinates become D ″i=(D″i1,D″i2,D″i3) Wherein:
Figure FDA0003316250950000041
after the constellation points are encrypted by the three-level masking factor, performing M times of upsampling on the output symbol information to obtain the upsampled symbol information;
performing shaping filtering on the up-sampled symbol information by using three filters which are orthogonal to each other pairwise;
and adding the three paths of parallel symbol information to obtain a complete encrypted modulation signal.
8. The spatial encryption method of claim 7,
the spatial encryption method further comprises:
after receiving an encrypted modulation signal passing through a channel, sequentially carrying out matched filtering, down sampling, three-level constellation decryption based on space transformation and two-level constellation decryption based on displacement transformation, obtaining original symbol information according to a minimum Euclidean distance judgment method, carrying out first-level bit decryption based on XOR operation, and recovering an original bit sequence.
CN202111231755.9A 2021-10-22 2021-10-22 Space encryption method based on three-dimensional CAP constellation Active CN113965312B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111231755.9A CN113965312B (en) 2021-10-22 2021-10-22 Space encryption method based on three-dimensional CAP constellation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111231755.9A CN113965312B (en) 2021-10-22 2021-10-22 Space encryption method based on three-dimensional CAP constellation

Publications (2)

Publication Number Publication Date
CN113965312A true CN113965312A (en) 2022-01-21
CN113965312B CN113965312B (en) 2023-06-09

Family

ID=79466122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111231755.9A Active CN113965312B (en) 2021-10-22 2021-10-22 Space encryption method based on three-dimensional CAP constellation

Country Status (1)

Country Link
CN (1) CN113965312B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114915348A (en) * 2022-05-13 2022-08-16 南京信息工程大学 High-safety and reliable three-dimensional grid coding modulation chaotic encryption transmission system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011156962A1 (en) * 2010-06-18 2011-12-22 Empire Technology Development Llc Asymmetrical chaotic encryption
AU2018102042A4 (en) * 2018-12-10 2019-01-17 Li, Lili MISS A color image encryption based on optical chaos and secure sharing in cloud
CN111277537A (en) * 2020-03-16 2020-06-12 南京信息工程大学 Data transmission method based on cubic constellation masking and three-dimensional photon probability forming
CN111417038A (en) * 2020-03-27 2020-07-14 南京信息工程大学 Safe optical access method based on two-stage spherical constellation masking
CN112422268A (en) * 2020-11-10 2021-02-26 郑州轻工业大学 Image encryption method based on block scrambling and state conversion

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011156962A1 (en) * 2010-06-18 2011-12-22 Empire Technology Development Llc Asymmetrical chaotic encryption
AU2018102042A4 (en) * 2018-12-10 2019-01-17 Li, Lili MISS A color image encryption based on optical chaos and secure sharing in cloud
CN111277537A (en) * 2020-03-16 2020-06-12 南京信息工程大学 Data transmission method based on cubic constellation masking and three-dimensional photon probability forming
CN111417038A (en) * 2020-03-27 2020-07-14 南京信息工程大学 Safe optical access method based on two-stage spherical constellation masking
CN112422268A (en) * 2020-11-10 2021-02-26 郑州轻工业大学 Image encryption method based on block scrambling and state conversion

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JI XU等: "High intensity image encryption scheme based on quantum logistic chaotic map and complex hyperchaotic system", IEEE *
潘勃;李骞;冯金富;徐建军;李斌;陶茜;: "一种新的离散混沌同步保密通信方案", 计算机应用 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114915348A (en) * 2022-05-13 2022-08-16 南京信息工程大学 High-safety and reliable three-dimensional grid coding modulation chaotic encryption transmission system

Also Published As

Publication number Publication date
CN113965312B (en) 2023-06-09

Similar Documents

Publication Publication Date Title
Man et al. Double image encryption algorithm based on neural network and chaos
Wang et al. Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network
Gao et al. A 3D model encryption scheme based on a cascaded chaotic system
Yasser et al. A new image encryption scheme based on hybrid chaotic maps
US9787647B2 (en) Secure computer evaluation of decision trees
Patel et al. Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique
Liu et al. Three-level quantum image encryption based on Arnold transform and logistic map
Song et al. Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map
CN101706946A (en) Digital image encryption method based on DNA sequence and multi-chaotic mapping
Yu et al. Chaos-based engineering applications with a 6D memristive multistable hyperchaotic system and a 2D SF-SIMM hyperchaotic map
CN101814985B (en) Block cipher system using multi-chaotic mapping multi-dynamic S-box
Lai et al. Analysis and implementation of no-equilibrium chaotic system with application in image encryption
Hu et al. Batch image encryption using generated deep features based on stacked autoencoder network
Telem et al. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network
CN106407824A (en) Image encryption method and device
Sun et al. Multiple-image encryption based on cascaded gyrator transforms and high-dimensional chaotic system
Hu et al. Quantum image encryption scheme based on 2d s ine 2-l ogistic chaotic map
Song et al. Multi-image reorganization encryption based on SLF cascade chaos and bit scrambling
CN112153238A (en) Image encryption method based on Tent mapping and composite chaotic mapping
CN113965312B (en) Space encryption method based on three-dimensional CAP constellation
Ye et al. Reversible image hiding algorithm based on compressive sensing and deep learning
Gao et al. An image encryption algorithm based on the improved sine-tent map
Chen et al. Region of interest encryption based on novel 2D hyperchaotic signal and bagua coding algorithm
Chang et al. A novel chaotic image encryption algorithm based on propositional logic coding
Liu et al. A BP neural network‐oriented henon hyperchaotic system for image encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 213000 Floor 9, building 1, Jiangnan modern industry research institute, Changzhou science and Education City, No. 18-18, Changwu Middle Road, Wujin District, Changzhou City, Jiangsu Province

Applicant after: Changzhou Jingxin New Generation Information Technology Research Institute Co.,Ltd.

Address before: 213000 Floor 9, building 1, Jiangnan modern industry research institute, Changzhou science and Education City, No. 18-18, Changwu Middle Road, Wujin District, Changzhou City, Jiangsu Province

Applicant before: Changzhou Beiyou New Generation Information Technology Research Institute Co.,Ltd.

GR01 Patent grant
GR01 Patent grant